Sign In
Upload
Manuals
Brands
Extreme Networks Manuals
Software
Sentriant AG 5.3
Extreme Networks Sentriant AG 5.3 Manuals
Manuals and User Guides for Extreme Networks Sentriant AG 5.3. We have
1
Extreme Networks Sentriant AG 5.3 manual available for free PDF download: Software User's Manual
Extreme Networks Sentriant AG 5.3 Software User's Manual (494 pages)
Brand:
Extreme Networks
| Category:
Software
| Size: 8.22 MB
Table of Contents
Table of Contents
3
List of Figures
15
List of Tables
21
Chapter 1: Introduction
23
Sentriant AG Home Window
23
System Monitor
24
Figure 1: Sentriant AG Home Window
24
Figure 2: System Monitor Window
25
Overview
26
Figure 3: System Monitor Window Legend
26
Table 1: Test Methods
27
About Sentriant AG
28
NAC Policy Definition
28
Endpoint Testing
29
Compliance Enforcement
29
Automated and Manual Repair
30
Targeted Reporting
30
The Sentriant AG Process
28
Technical Support
30
Table 2: Sentriant AG Technical Support
30
Additional Documentation
31
Installing and Upgrading
31
Conventions Used in this Document
31
Navigation Paragraph
31
Note Paragraph
32
Caution Paragraph
32
Warning Paragraph
32
Bold Font
32
Task Paragraph
32
Italic Text
33
Courier Font
33
Angled Brackets
33
Square Brackets
34
Terms
34
Copying Files
34
Scp
35
Pscp
35
Users' Guide Online Help
35
Figure 4: Online Help
36
Figure 5: Index Tab
37
Figure 6: Search Tab
38
Chapter 2: Clusters and Servers
39
Single-Server Installation
40
Multiple-Server Installations
40
Figure 7: Single-Server Installation
40
Figure 8: Multiple-Server Installation
41
Figure 9: Multiple-Server, Multiple-Cluster Installation
42
Chapter 3: System Configuration
43
Introduction
43
Table 3: Default Menu Options
43
Enforcement Clusters and Servers
44
Enforcement Clusters
45
Adding an Enforcement Cluster
45
Figure 10: System Configuration, Enforcement Clusters & Servers
45
Figure 11: Add Enforcement Cluster
46
Editing Enforcement Clusters
47
Viewing Enforcement Cluster Status
47
Deleting Enforcement Clusters
48
Figure 12: Enforcement Cluster, General
48
Enforcement Servers
49
Adding an es
49
Figure 13: System Configuration, Enforcement Clusters & Servers
49
Cluster and Server Icons
50
Figure 14: Add Enforcement Server
50
Editing Ess
51
Figure 15: Enforcement Cluster Legend
51
Changing the es Network Settings
52
Figure 16: Enforcement Server
52
Changing the es Date and Time
53
Modifying the es SNMP Settings
53
Modifying the es Root Account Password
54
Viewing es Status
54
Deleting Ess
55
Figure 17: Enforcement Server, Status
55
ES Recovery
56
Management Server
56
Viewing Network Settings
56
Figure 18: System Configuration, Management Server
57
Modifying MS Network Settings
58
Figure 19: Management Server Network Settings
58
Selecting a Proxy Server
59
Setting the Date and Time
59
Automatically Setting the Time
60
Manually Setting the Time
60
Figure 20: Date & Time
60
Selecting the Time Zone
61
Enabling SNMP
61
Modifying the MS Root Account Password
62
Checking for Sentriant AG Upgrades
62
Changing the Sentriant AG Upgrade Timeout
63
User Accounts
63
Adding a User Account
63
Figure 21: System Configuration, User Accounts
64
Figure 22: Add User Account
65
Searching for a User Account
66
Table 4: Default User Roles
66
Sorting the User Account Area
67
Copying a User Account
67
Figure 23: Copy User Account
67
Editing a User Account
68
Figure 24: User Account
68
Deleting a User Account
69
User Roles
69
Adding a User Role
69
Figure 25: System Configuration, User Roles
70
Figure 26: Add User Role
70
Editing User Roles
71
Table 5: User Role Permissions
71
Deleting User Roles
72
Sorting the User Roles Area
72
Figure 27: User Role
72
License
73
Updating Your License Key
73
Figure 28: System Configuration, License
73
Test Updates
74
Manually Checking for Test Updates
74
Selecting Test Update Times
75
Figure 29: System Configuration, Test Updates
75
Viewing Test Update Logs
76
Figure 30: Test Update Log
76
Figure 31: Test Update Log Window Legend
76
Quarantining, General
77
Selecting the Quarantine Method
77
Figure 32: System Configuration, Quarantining
78
Selecting the Access Mode
79
Quarantining, 802.1X
79
Entering Basic 802.1X Settings
79
Authentication Settings
80
Selecting the RADIUS Authentication Method
80
Configuring Windows Domain Settings
80
Figure 33: System Configuration, Windows Domain
81
Configuring Openldap Settings
82
Figure 34: System Configuration, Openldap
83
Adding 802.1X Devices
85
Figure 35: Add 802.1X Device
85
Testing the Connection to a Device
86
Figure 36: Add 802.1X Device, Test Connection Area Option 1
86
Figure 37: Add 802.1X Device, Test Connection Area Option 2
86
Cisco IOS
87
Figure 38: Add Cisco IOS Device
88
Cisco Catos
89
Figure 39: Add Cisco Catos Device
89
Catos User Name in Enable Mode
91
Enterasys
91
Figure 40: Add Enterasys Device
92
Extremeware
93
Figure 41: Add Extremeware Device
93
Extremexos
94
Figure 42: Add Extremexos Device
95
Foundry
96
Figure 43: Add Foundry Device
96
HP Procurve Switch
97
Figure 44: Add HP Procurve Device
98
HP Procurve WESM Xl or HP Procurve WESM Zl
100
Figure 45: Add HP Procurve WESM Xl/Zl Device
101
HP Procurve 420 AP or HP Procurve 530 AP
102
Figure 46: Add HP Procurve 420/530 AP Device
103
Nortel
104
Figure 47: Add Nortel Device
105
Other
106
Figure 48: Add Other Device
107
Quarantining, DHCP
108
DHCP Server Configuration
108
Setting DHCP Enforcement
108
Adding a DHCP Quarantine Area
109
Figure 49: System Configuration, Quarantining, DHCP Enforcement
109
Figure 50: Add a Quarantine Area
110
Sorting the DHCP Quarantine Area
111
Editing a DHCP Quarantine Area
111
Deleting a DHCP Quarantine Area
112
Quarantining, Inline
112
Figure 51: Quarantine Area
112
Post-Connect
113
Allowing the Post-Connect Service through the Firewall
113
First Time Selection
113
Figure 52: Post-Connect Configuration Message
113
Setting Sentriant AG Properties
114
Configuring a Post-Connect System
114
Figure 53: System Configuration, Post-Connect
115
Launching Post-Connect Systems
116
Post-Connect in the Endpoint Activity Window
116
Figure 54: Post-Connect Launch Window
116
Adding Post-Connect System Logos and Icons
117
Figure 55: Post-Connect Quarantine Details
117
Maintenance
118
Initiating a New Backup
119
Figure 56: System Configuration, Maintenance
119
Restoring from a Backup
120
Downloading Support Packages
120
Figure 57: Backup Successful Message
120
Cluster Setting Defaults
121
Testing Methods
121
Selecting Test Methods
121
Figure 58: System Configuration, Testing Methods
121
Ordering Test Methods
122
Recommended Test Methods
122
Selecting End-User Options
123
Quarantine/Guest Resources
123
Figure 59: System Configuration, Quarantine/Guest Resources Area
124
Table 6: Resource Tips
125
Notifications
126
Enabling Notifications
126
Figure 60: System Configuration, Notifications
127
End-User Screens
128
Specifying an End-User Screen Logo
128
Specifying the End-User Screen Text
129
Figure 61: System Configuration, End-User Screens
129
Specifying the End-User Test Failed Pop-Up Window
130
Agentless Credentials
131
Adding Windows Credentials
131
Figure 62: System Configuration, Agentless Credentials
131
Figure 63: Agentless Credentials, Add Windows Administrator Credentials
132
Testing Windows Credentials
133
Editing Windows Credentials
133
Deleting Windows Credentials
134
Sorting the Windows Credentials Area
134
Logging
134
Setting es Logging Levels
134
Setting 802.1X Devices Logging Levels
135
Figure 64: System Configuration, Logging Option
135
Advanced Settings
136
Setting Timeout Periods
136
Figure 65: System Configuration, Advanced Option
137
Chapter 4: Endpoint Activity
139
Figure 66: Endpoint Activity, Connected Endpoints
139
Finding Endpoints
140
Figure 67: Endpoint Activity, Primary Filtering Options
140
Primary Endpoint Filtering
140
Figure 68: Endpoint Activity, Secondary Filtering Options
141
Secondary Endpoint Filtering
141
Figure 69: Search Criterion Affecting Endpoint Activity Results
143
Figure 70: Display Endpoints Drop-Down
143
Limiting the Number of Endpoints Displayed at One Time
143
Quickly Viewing Endpoint Access Control Status
144
Figure 71: Access Control Status Rollover
145
Figure 72: Endpoint Activity Icon Legend
146
Quickly Viewing Endpoint Test Status
146
Figure 73: Endpoint Test Status Rollover
147
Viewing Detailed Endpoint Information
147
Figure 74: Endpoint, General Information
148
Figure 75: Endpoint, Test Results
149
Temporarily Granting Access to Endpoints
149
Clearing Temporary Access Control for Endpoints
150
Temporarily Quarantining Endpoints
150
Having Endpoints Retested
151
Managing Endpoints
143
Additional Information
151
Chapter 5: End-User Access
153
Test Methods Used
153
Agent Callback
153
Endpoints Supported
154
Browser Version
155
Firewall Settings
156
Managed Endpoints
156
Unmanaged Endpoints
156
Making Changes to the Firewall
156
Windows Endpoint Settings
156
IE Internet Security Setting
156
Agent-Based Test Method
157
Ports Used for Testing
157
Windows Vista Settings
157
Agentless Test Method
157
Configuring Windows 2000 Professional for Agentless Testing
157
Configuring Windows XP Professional for Agentless Testing
158
Figure 76: Local Area Connection Properties
158
Configuring Windows Vista for Agentless Testing
159
Figure 77: Local Area Connection Properties
159
Defining the Agentless Group Policy Object
160
Figure 78: Group Policy Management Window
160
Figure 79: New GPO Window
161
Figure 80: Group Policy Object Editor
161
Figure 81: Network Access Window
162
Figure 82: Network Security Window
163
Figure 83: Network Connection Properties Window
164
Figure 84: Remote Procedure Call Properties Window
164
Figure 85: Remote Registry Properties Window
165
Figure 86: Windows Firewall Window
166
Figure 87: Microsoft Peer-To-Peer Window
167
Ports Used for Testing
168
Allowing the Windows RPC Service through the Firewall
168
Figure 88: Double Arrow Icon
168
Activex Test Method
170
Ports Used for Testing
170
Windows Vista Settings
170
Mac os X Endpoint Settings
170
Allowing Sentriant AG through the os X Firewall
170
Figure 89: Mac System Preferences
171
Figure 90: Mac Sharing
172
End-User Access Windows
173
Figure 91: Mac Ports
173
Figure 92: End-User Opening Window
174
Opening Window
174
Windows NAC Agent Test Windows
175
Automatically Installing the Windows Agent
175
Figure 93: End-User Installing Window
175
Figure 94: End-User Agent Installation Failed
176
Removing the Agent
177
Figure 95: End-User Agent Installation Window (Start)
177
Figure 96: End-User Agent Installation Window (Finish)
177
Manually Installing the Windows Agent
178
Figure 97: Add/Remove Programs
178
How to View the Windows Agent Version Installed
179
Figure 98: Security Certificate
179
Figure 99: Run or Save to Disk
179
Mac os Agent Test Windows
180
Installing the MAC os Agent
180
Figure 100: Agent Version
180
Figure 101: Start Mac os Installer
180
Figure 102: Mac os Installer 1 of 5
181
Figure 103: Mac os Installer 2 of 5
181
Figure 104: Mac os Installer 3 of 5
182
Figure 105: Mac os Installer 4 of 5
182
Verifying the Mac os Agent
183
Figure 106: Mac os Installer 5 of 5
183
Figure 107: Applications, Utilities Folder
184
Figure 108: Activity Monitor
185
Removing the Mac os Agent
186
Figure 109: Mac Terminal
186
Activex Test Windows
187
Figure 110: End-User Activex Plug-In Failed
187
Agentless Test Windows
188
Figure 111: End-User Login Credentials
188
Figure 112: End-User Login Failed
189
Figure 113: End-User Testing
190
Figure 114: End-User Testing Successful
190
Test Successful Window
190
Testing Window
190
Figure 115: End-User Testing Cancelled
191
Testing Cancelled Window
191
Testing Failed Window
191
Figure 116: End-User Testing Failed Example 1
192
Error Windows
193
Customizing Error Messages
193
Figure 117: End-User Testing Failed, Printable Results
193
Figure 118: End-User Error
193
Table 7: Default Test Names and Descriptions
195
Chapter 6: NAC Policies
201
Figure 119: NAC Policies Window
201
NAC Policy Group Tasks
202
Figure 120: NAC Policies Window Legend
202
Adding a NAC Policy Group
203
Editing a NAC Policy Group
203
Figure 121: Add NAC Policy Group
203
Deleting a NAC Policy Group
204
Figure 122: Edit NAC Policy Group
204
Standard NAC Policies
202
NAC Policy Tasks
205
Enabling or Disabling a NAC Policy
205
Changing the NAC Policy Selection Order
205
Figure 123: NAC Policy Selection Order Buttons
205
Selecting the Default NAC Policy
206
Creating a New NAC Policy
206
Figure 124: the Default NAC Policy for a NAC Policy Group, Indicated by a Blue Checkmark Icon
206
Figure 125: Add a NAC Policy, Basic Settings Area
207
Figure 126: Add a NAC Policy, Endpoints Area
210
Figure 127: Add NAC Policy, Tests Area
212
Figure 128: NAC Policy Test Failure Icons
213
Editing a NAC Policy
214
Copying a NAC Policy
214
Deleting a NAC Policy
215
Moving a NAC Policy between NAC Policy Groups
215
Chapter 7: Quarantined Networks
217
New End-Users
217
Shared Resources
217
Untestable Endpoints and DHCP Mode
217
Windows Domain Authentication and Quarantined Endpoints
218
Chapter 8: High Availability and Load Balancing
221
High Availability
221
Figure 129: Inline Installations
222
Figure 130: DHCP Installation
223
Figure 131: 802.1X Installation
224
Load Balancing
225
Chapter 9: Inline Quarantine Method
227
Figure 132: Inline Installations
228
Chapter 10: DHCP Quarantine Method
229
Configuring Sentriant AG for DHCP
230
Figure 133: DHCP Installation
230
Configuring Windows Update Service for XP SP2
231
Router Configuration
231
Configuring the Router Acls
231
Setting up a Quarantine Area
231
Chapter 11: 802.1X Quarantine Method
233
About 802.1X
233
Sentriant AG and 802.1X
234
Figure 134: 802.1X Components
234
Figure 135: Sentriant AG 802.1X Enforcement
235
Figure 136: 802.1X Communications
236
Setting up the 802.1X Components
237
Setting up the RADIUS Server
237
Proxying RADIUS Requests to an Existing RADIUS Server Using the Built-In Sentriant AG RADIUS Server
237
Using the Built-In Sentriant AG RADIUS Server for Authentication
240
Enabling Sentriant AG for 802.1X
240
Sentriant AG User Interface Configuration
240
Setting up the Supplicant
241
Figure 137: Enabling 802.1X in the User Interface
241
Figure 138: Windows XP Pro Local Area Connection, General Tab
242
Windows XP Professional Setup
242
Figure 139: Windows XP Pro Local Area Connection Properties, Authentication Tab
243
Windows XP Home Setup
243
Windows 2000 Professional Setup
244
Figure 140: Windows 2000 Local Area Connection Properties, General Tab
245
Figure 141: Windows 2000 Local Area Connection Properties, Authentication Tab
245
Figure 142: Wired Autoconfig Properties
246
Windows Vista Setup
246
Figure 143: Windows Vista Local Area Connection, Networking Tab
247
Figure 144: Windows Vista Local Area Connection Properties, Authentication Tab
247
Setting up the Authenticator
248
Cisco® 2950 IOS
248
Cisco® 4006 Catos
249
Enterasys® Matrix 1H582-25
249
Extreme Networks® Summit 48Si
250
Extremeware
251
Extremexos
251
Foundry® Fastiron® Edge 2402
252
HP Procurve 420AP
252
HP Procurve 530AP
253
HP Procurve 3400/3500/5400
254
Nortel® 5510
254
Creating Custom Expect Scripts
255
Figure 145: Nortel Initialization Script
256
Figure 146: Nortel Re-Authentication Script
256
Figure 147: Nortel Exit Script
256
Table 8: Expect Script Commands and Parameters
257
Chapter 12: API
261
Overview
261
Setting Sentriant AG Properties
262
Figure 148: Sentriant AG API Communication
262
Setting Firewall Rules
263
Sentriant AG Events Generated
263
Examples of Events Generated
264
Java Program and Command for Events
266
Sentriant AG Requests Supported
266
Examples of Requests
267
Post-Connect Request Example
269
Java Program and Command for Requests
270
Chapter 13: Remote Device Activity Capture
271
Creating a DAC Host
271
Downloading the EXE File
272
Running the Windows Installer
272
Figure 149: the DAC Installshield Wizard Welcome Window
273
Figure 150: RDAC Installer, Setup Type
273
Figure 151: RDAC Installer, Choose Destination Location
274
Figure 152: RDAC Installer, Confirm New Folder
274
Figure 153: RDAC Installer, Select Features
275
Figure 154: RDAC Installer, NIC Selection
275
Figure 155: RDAC Installer, TCP Port Filter Specification
276
Figure 156: RDAC Installer, Enforcement Server Specification
276
Figure 157: RDAC Installer, Ready to Install the Program
277
Figure 158: RDAC Installer, Installshield Wizard Complete
278
Adding Additional Interfaces
279
Figure 159: Example Wrapper.conf File
279
Configuring the MS and es for DAC
280
Adding Additional Ess
280
Starting the Windows Service
281
Viewing Version Information
282
Removing the Software
282
Figure 160: NAC Endpoint Activity Capture Service
282
Figure 161: RDAC Uninstall Complete
283
Sentriant AG to Infoblox Connector
284
Configuring the Infoblox Server
284
Configuring Sentriant AG
284
Chapter 14: Reports
287
Table 9: Report Types and Fields
287
Generating Reports
288
Figure 162: Reports
289
Figure 163: NAC Policy Results Report
290
Viewing Report Details
290
Figure 164: Test Details Report
291
Converting an HTML Report to a Word Document
292
Printing Reports
292
Saving Reports to a File
292
Chapter 15: DHCP Plug-In
295
Figure 165: DHCP Plug-In
295
Preparing for DHCP Plug-In Installation
296
DHCP Plug-In and the Sentriant AG User Interface
297
Installing the Plug-In
297
Figure 166: System Configuration, Quarantining, DHCP
298
Figure 167: DHCP Plug-In Installshield Wizard Window
299
Figure 168: DHCP Plug-In Customer Information Window
299
Figure 169: DHCP Plug-In Ready to Install the Program Window
300
Figure 170: DHCP Plug-In Installshield Wizard Complete Window
300
Table 10: DHCP Plug-In Configuration File Settings
300
Enabling the Plug-In and Adding Servers
301
Figure 171: Add DHCP Plug-In Configuration
302
Viewing DHCP Server Plug-In Status
303
Figure 172: DHCP Plug-In Server Added Example
303
Figure 173: DHCP Plug-In Legend
303
Editing DHCP Server Plug-In Configurations
304
Deleting a DHCP Server Plug-In Configuration
304
Figure 174: DHCP Plug-In Configuration
304
Disabling a DHCP Server Plug-In Configuration
305
Enabling a DHCP Server Plug-In Configuration
305
Chapter 16: System Administration
307
Launching Sentriant AG
307
Launching and Logging into Sentriant AG
307
Logging out of Sentriant AG
307
Important Browser Settings
307
Restarting Sentriant AG System Processes
307
Managing Your Sentriant AG License
308
Entering a New License Key
308
Table 11: Service Stop and Restart Commands
308
Downloading New Tests
309
System Settings
310
Dns/Windows Domain Authentication and Quarantined Endpoints
310
Matching Windows Domain Policies to NAC Policies
311
Setting the Access Mode
311
Naming Your Enforcement Cluster
312
Changing the MS Host Name
312
Changing the es Host Name
312
Changing the MS or es IP Address
312
Resetting Your System
313
Resetting Your Test Data
314
Changing Properties
315
Specifying an Email Server for Sending Notifications
316
Entering Networks Using CIDR Format
316
Table 12: CIDR Naming Conventions
316
Database
317
Creating a Backup File
317
Changing the Backup Timeouts
317
Restoring from Backup
318
Restoring to a New Server
318
Restoring to the same Server
318
Restoring the Original Database
319
Figure 175: Restore System
319
Figure 176: Login
319
Generating a Support Package
320
System Requirements
320
Table 13: Sentriant AG System Requirements
320
Supported Vpns
321
Adding Custom Tests
322
Introduction
322
References
322
Changing the Error Messages in a Test Script
322
Figure 177: Test Script Code
323
Figure 178: Example Installcustomtests Output
325
Creating a Custom Test Class Script from Scratch
326
Figure 179: Testtemplate.py
327
Figure 180: Checkopenports.py Script
330
Basictests API
334
Table 14: Basictests API
335
End-User Access Windows
342
How Sentriant AG Handles Static IP Addresses
343
Managing Passwords
344
Table 15: Sentriant AG Passwords
344
Resetting the Sentriant AG Server Password
345
Changing the Sentriant AG Administrator Password
346
When the Password Is Known
346
When the Password Is Unknown
346
Resetting the Sentriant AG Database Password
346
NTLM 2 Authentication
347
Working with Ranges
347
Installing SSL Certificates
349
Moving an es from One MS to Another
350
Recovering Quickly from a Network Failure
351
VLAN Tagging
352
Iptables Wrapper Script
353
Updating Rules Without an Internet Connection
354
Downloading the Files
354
Updating Rules
355
Supporting Network Management System
355
Enabling ICMP Echo Requests
355
Enable Temporary Ping
356
Enable Persistent Ping
356
Restricting the ICMP Request
356
Changing the Community Name for SNMPD
357
Figure 181: Snmpd.conf Example File
358
SNMP Mibs
359
Appendix A: Requirements
361
Chapter B: Patch Management
363
Flagging a Test to Launch a Patch Manager
363
Figure 182: Initiate a Patch Manager Check Box
363
Selecting the Patch Manager
364
Specifying the Number of Retests
364
Specifying the Retest Frequency
364
SMS Patch Management
365
SMS Concepts
365
Sentriant Ag/Sms/Sentriant AG Process
365
Sentriant AG Setup
366
Learning more about SMS
366
Appendix C: Access Control Precedence
367
Table 16: Access Control Precedence
367
Appendix D: Endpoint Testing Conditions
369
Table 17: Conditions Affecting Endpoint Testing
369
Appendix E: Troubleshooting Quarantined Endpoints
373
Table 18: Troubleshooting Quarantined Endpoints
373
Appendix F: Enforcement Server Processes and Threads
377
Table 19: Enforcement Server Processes and Threads
377
Appendix G: Configuring the Post-Connect Server
381
Overview
381
Extracting the ZIP File
381
Windows
381
Linux
382
ZIP File Contents
382
Setting up a Post-Connect Host
383
Windows
383
Linux
384
Viewing Logs
386
Testing the Service
386
Windows
386
Linux
386
Configuring Your Sensor
387
Allowing Sentriant AG through the Firewall
387
Appendix H: Tests Help
389
Browser Security Policy-Windows
389
Table 20: Browser Vulnerabilities
389
Browser Version
391
Internet Explorer (IE) Internet Security Zone
391
Internet Explorer (IE) Local Intranet Security Zone
392
Internet Explorer (IE) Restricted Site Security Zone
392
Internet Explorer (IE) Trusted Sites Security Zone
393
Operating System-Windows
394
IIS Hotfixes
394
Internet Explorer Hotfixes
395
Microsoft Office Hotfixes
395
Figure 183: Microsoft Office Hotfixes Critical Updates
395
Microsoft Applications Hotfixes
396
Microsoft Servers Hotfixes
396
Microsoft Tools Hotfixes
396
Service Packs
397
Windows 2000 SP4 Hotfixes
397
Windows 2003 SP1 Hotfixes
397
Windows 2003 SP2 Hotfixes
398
Windows Automatic Updates
398
Windows Media Player Hotfixes
399
Windows Vista™ SP0 Hotfixes
399
Windows XP SP1 Hotfixes
400
Windows XP SP2 Hotfixes
400
Security Settings-OS X
401
Mac Airport WEP Enabled
401
Mac Airport Preference
401
Mac Airport User Prompt
401
Mac Anti-Virus
402
Mac Bluetooth
402
Mac Firewall
402
Mac Internet Sharing
403
Mac Quicktime® Updates
403
Mac Security Updates
404
Mac Services
404
Security Settings-Windows
404
Allowed Networks
405
Microsoft Excel Macros
405
Microsoft Outlook Macros
406
Microsoft Word Macros
406
Services Not Allowed
407
Services Required
408
Windows Bridge Network Connection
409
Windows Wireless Network SSID Connections
409
Windows Security Policy
409
Windows Startup Registry Entries Allowed
410
Wireless Network Connections
411
Software-Windows
412
Anti-Spyware
412
Anti-Virus
412
High-Risk Software
413
Microsoft Office Version Check
413
P2P
413
Personal Firewalls
414
Software Not Allowed
414
Software Required
415
Worms, Viruses, and Trojans
415
Appendix I: Database Design (Data Dictionary)
417
Test_Result Table
418
Device Table
419
Sa_Cluster
421
Sa_Node
421
Sa_User
422
Cluster_To_User
422
User_Group
422
User_To_Groups
423
Group_To_Permission
423
Appendix J: Ports Used in Sentriant AG
425
Table 21: Ports in Sentriant AG
425
Appendix K: MS Disaster Recovery
431
Overview
431
Installation Requirements
431
Installing the Standby MS
431
Ongoing Maintenance
432
Failover Process
432
Appendix L: Licenses
435
Extreme Networks End-User License Agreement
435
Limitation of Liability
436
Other Licenses
437
Apache License Version 2.0, January 2004
438
Asm
439
Open SSH
440
Postgresql
442
Postgresql Jdbc
443
Xstream
443
Libeay (Open SSL)
443
Junit Common Public License - V 1.0
444
Open SSL
446
The GNU General Public License (GPL) Version 2, June 1991
447
Pullparser
450
Xpp3
450
The GNU Lesser General Public License (LGPL) Version 2.1
451
Ojdbc
455
Javamail Sun Microsystems, Inc
457
Jcharts
459
Pyxml Python License (CNRI Python License)
459
IO-Stty and IO-Tty
460
Concurrent
461
Crypto
461
Winpcap
462
Activation
464
Java Optional Package
465
Jsp-Api Package
466
Appendix M: Glossary
471
Index
481
Advertisement
Advertisement
Related Products
Extreme Networks Sentriant AG 5.2
Extreme Networks Sentriant AG
Extreme Networks Sentriant NG Operation Console
Extreme Networks Sentriant AG200
Extreme Networks AP-7562
Extreme Networks ExtremeMobility AP460i
Extreme Networks ExtremeMobility AP460e
Extreme Networks ExtremeWireless AP360i-FCC
Extreme Networks AH-ACC-BKT-AX-IL
Extreme Networks ACC-BKT-AX-JB
Extreme Networks Categories
Switch
Wireless Access Point
Software
Network Hardware
Network Accessory
More Extreme Networks Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL